About the Review

Welcome to the Critical Infrastructure Protection (CIP) Review website.

Today’s interdependent and interconnected world requires joint efforts and holistic approaches to protect critical infrastructure assets from the growing number of attacks and to address ever-evolving convergent threats to our economy, security and well-being.

Critical Infrastructure Protection Review – the go-to destination for the latest news, insights and expert knowledge, is designed to assist governments, and the public and private sectors to improve security and resilience of vital critical infrastructures and strengthen their preparedness to withstand and recover from the physical and cyber attacks.

With a subscriber base encompassing key decision makers and professionals from the defence, law enforcement, aerospace, transportation, energy, banking, telecommunication and other critical sectors, we aim to enhance cooperation and provide an effective information-sharing platform and engage top-security leaders through news, articles and events.

Subscribe to the magazine and newsletter

Top News

  • UK Government website offline after hack infects thousands more worldwide

    February 11, 2018

    More than 5,000 websites have been hacked to force visitors’ computers to run software that mines a cryptocurrency similar to Bitcoin. Users loading the websites of the Information Commissioner’s Office, the Student Loans Company, as well as the council websites for Manchester City, Camden, and Croydon – and even the homepage of the United States Courts ...

  • Police trial new mobile fingerprint scanners to identify suspects

    February 10, 2018

    Police officers are being given mobile finger print scanners to instantly identify suspected criminals and illegal immigrants. Two hundred and fifty of the new pocket-sized devices are being trialled in West Yorkshire before being rolled out by the Home Office across the country. The scanners, which cost less than £300 each, can be used by any officer ...

  • 3rd Brigade Combat Team: Chemical training

    February 8, 2018

    The 3rd Brigade Combat Team’s chemical reconnaissance platoon, 21st Brigade Engineer Battalion, recently trained to respond to a Level-A Chemical, Biological, Radiological, Nuclear incident as part of the unit’s ongoing platoon Military Operations in Urban Terrain training. On Jan. 31, Soldiers from C Company conducted room-clearing operations after one of their squads was “killed” by a ...

  • Police ‘may need AI to help cope with huge volumes of evidence’

    February 8, 2018

    Police should look at using artificial intelligence to help cope with the scale of information involved in investigations and avoid the kinds of mistakes that have led to a string of collapsed rape trials, a senior police chief said on Wednesday. Sara Thornton, the chair of the National Police Chiefs’ Council, said the volume of data held ...

  • Water Utility in Europe Hit by Cryptocurrency Malware Mining Attack

    February 7, 2018

    Unauthorized crytocurrency mining attacks, sometimes referred to as “cryptojacking” have found a new target – operational technology used in critical industrial infrastructure. Security firm Radiflow, discovered that cryptocurrency mining malware was found in the network of a water utility provider in Europe. The attack is the first public discovery of an unauthorized cryptocurrency miner impacting industrial ...

  • Pirates release crew of oil tanker hijacked off West Africa

    February 6, 2018

    Pirates have released 22 Indian nationals taken captive after their oil tanker was boarded off the coast of West Africa last week. The vessel, Marine Express, was carrying more than 13,000 tons of gasoline when it went missing in the Gulf of Guinea, according to a statement from the Anglo Eastern, the ship’s managing company, which ...

  • Why Every Company Should Consider Creating a “Cyber No-Fly List”

    February 6, 2018

    We’ve all heard of the No-Fly List. Managed by the FBI’s Terrorist Screening Center, the list bans people on it from boarding commercial aircraft within, into, or out of the United States. The No-Fly List is only one tactic that the U.S. uses in its fight against terrorism, but since its inception there haven’t been ...

  • How to Stop a Terrorist: Identifying Extremist Activity and Behavior

    February 5, 2018

    Today the United States is facing significant and diverse terrorism threats from overseas terrorist groups, foreign extremist infiltrators, and even radicalized domestic citizens. Many attackers have overt and observable signs of radicalization or pre-attack actions that may enable prevention if suspicious activity is reported and synthesized with other available information beforehand. What signs should intelligence and ...

  • Boards should appoint lead on data security, NHS England review suggests

    February 5, 2018

    Organisations should appoint a board lead on data security and consider suspending IT access for any executive who fails to complete annual cybersecurity training, NHS England’s chief information officer has suggested. Will Smart makes the proposals in his “lessons learned” review of the WannaCry attack, which hit 35% of NHS trusts in May last year and led some to ...

  • GCHQ unit claims it has ‘objectively’ made the UK a less desirable target to cybercrims

    February 5, 2018

    GCHQ’s National Cyber Security Centre claims that its strategy of “actively defending” the UK against high-volume commodity attacks is working. The Active Cyber Defence (ACD) programme aims to “protect the majority of people in the UK from the majority of the harm, caused by the majority of the attacks, for the majority of the time”. The ...

  • State Intelligence/Fusion Center staying ahead of next threat

    February 5, 2018

    High above the congested traffic on Kanawha Boulevard across the river from the state Capitol, Scott Pauley helps manage a team of eight intelligence analysts constantly searching for the next potential threat. Pauley is deputy director of the West Virginia Intelligence/Fusion Center located inside the old Columbia Gas Building in Charleston. The highly secure facility is a ...

  • ISNR Abu Dhabi 2018 to Examine Role of Artificial Intelligence in Homeland Security in Line with UAE Leadership’s Vision

    February 5, 2018

    Artificial intelligence to form essential component of Infosecurity Middle East, ME3S, collocated forums AI has potential to transform national security technology, says US study Reed Exhibitions, the leading global event organiser, confirmed that in line with the UAE leadership’s vision, artificial intelligence (AI) will form an important underlying component of the eighth edition of the International Exhibition ...